Muutke küpsiste eelistusi

E-raamat: Cyber Threat and Globalization: The Impact on U.S. National and International Security

  • Formaat: PDF+DRM
  • Ilmumisaeg: 26-Jun-2018
  • Kirjastus: Rowman & Littlefield Publishers
  • Keel: eng
  • ISBN-13: 9781538104323
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 49,40 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 26-Jun-2018
  • Kirjastus: Rowman & Littlefield Publishers
  • Keel: eng
  • ISBN-13: 9781538104323
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

In the post-industrial age, information is more valuable than territory and has become the main commodity influencing geopolitics today. The reliance of societies on cyberspace and information and communication technologies (ICTs) for economic prosperity and national security represents a new domain of human activity and conflict. Their potential as tools of social disruption and the low cost of entry of asymmetric conflict have forced a paradigm shift. The Cyber Threat and Globalization is designed for students of security studies and international relations, as well as security professionals who want a better grasp of the nature and existential threat of todays information wars. It explains policies and concepts, as well as describes the threats posed to the U.S. by disgruntled employees, hacktivists, criminals, terrorists, and hostile governments. Features ·Special textboxes provide vignettes and case studies to illustrate key concepts. ·Opinion pieces, essays, and extended quotes from noted subject matter experts underscore the main ideas. ·Written to be accessible to students and the general public, concepts are clear, engaging, and highly practical.

Arvustused

Globalization and Cyber Security are both currently compelling topics. The first has been running for long enough to have acquired chameleon like characteristics making its consequences hard to interpret and the second, emerging somewhat later, but around for long enough to raise serious anxieties. The communications revolution which matured in the later 20th century has been the fundamental cause of these phenomena and this book makes that relationship very clear. In doing so, it creates a hitherto unfamiliar but vitally important context for linking and then learning about both. Such an achievement would be remarkable but less significant in its effect if it were not for the clarity and ingenuity of the books presentation. This is a seriously useful contribution neatly and effectively aimed at the appropriate educational level and will be of great interest to a more general readership as well. -- Richard Langhorne, Director of the Center for Global Studies, University of Buckingham; former Director of the Centre of International Studies, University of Cambridge; former Director and Chief Executive of Wilton Park Executive Agency, Foreign and Commonwealth Office of the British Government; What does it mean to be secure in a hyper-connected world?  This book takes you on a journey through history and illuminates the evolution of the Internet and our networked society and all that threatens it.  The authors are able to unpack the complex nature of ever-evolving cyber threats, and provide an easy-to-read yet deeply informative interpretation of how our modern way of life, from national security to commerce to communication, is threatened by cyber insecurity.   We are reminded of Aristotles arguments that the state must assure the best interest of the community and then learn, page after page, about the depth of the policy, economic, social, and technological issues that entangle cyberspace and why so many different actors, especially China, Russia, and the United States, are trying to wield power, assert control, and gain economic, political, and military advantage in and through cyberspace.  Knowing that history can inform the future, the authors present a well-researched overview of the next generation technologies that will continue to confound policy makers, statesmen, security practitioners, and military leaders, and destabilize our economies, democracies, and society writ large. This book provides a foundational understanding of how cyberspace has transformed the nature of national security, global conflict, and international relations, and will be relevant for years to come. -- Melissa Hathaway, President, Hathaway Global Strategies; former cyber advisor to Presidents George W. Bush and Barack H. Obama

Preface vii
1 Defining Cyberspace
1(32)
A World at War with Itself
1(2)
What, Then, Is Cyber?
3(2)
The History of the Internet
5(5)
Unfettered Growth and Challenges
10(2)
Information Technology versus Operational Technology
12(2)
Vulnerabilities
14(2)
The Internet of Things (IoT)
16(1)
Cloud Computing
17(1)
A Two-Edged Sword
18(2)
The Next-Generation Internet (IPv6)
20(2)
Cybersecurity
22(2)
Overview of the Attack Matrix
24(9)
2 The Mutable Domain
33(32)
What Is Cryptology?
33(3)
Exploiting the System
36(2)
The Onion Router (TOR)
38(5)
Attackers, Facilitators, Defenders, and Targets
43(1)
Malware
44(3)
Cryptocurrencies
47(2)
Advanced Persistent Threat (APT)
49(5)
The Deep and Dark Webs
54(4)
The Lexicon of Cyber Conflict
58(7)
3 Global Cyber Risk and Access Vectors
65(28)
The Globalization Process
65(5)
Motives and Sources of Attack
70(2)
Policy Lagging Technology
72(3)
The "Sordid Boon" of Social Media
75(4)
Algorithms, Software, Audience Mapping, and Targeted Messaging
79(4)
"Swarmcasting"---Terrorists, Protesters, and Hired Guns
83(2)
"Psyber Warfare"
85(2)
Broadband Mobility
87(6)
4 China
93(30)
Market Ownership: Controlling the Rules and Physics of the Domain
94(2)
Nation-State Economic Espionage
96(3)
Ancient Traditions and Modern Realities
99(1)
"Win Victory before the First Battle" Abroad and at Home
100(2)
Organization and Missions
102(3)
Espionage for National Security and Economic Advantage---"Know Yourself, Know Your Enemy"
105(3)
Espionage for National Security and Military Advantage---"Kill with a Borrowed Sword"
108(3)
Information Control for Regime Stability
111(1)
The "Great Firewall" and the "Great Cannon"---the Cyber Janus
111(2)
PLA Reform and the Strategic Support Force
113(2)
Mutually Assured Deterrence
115(1)
U.S.-Chinese Positive Engagement: Dialogue for Cyber Stability
116(1)
Building toward a Cooperative Spirit
116(1)
Beyond the Rhetoric
117(2)
Conclusion
119(4)
5 Russia
123(32)
Estonia, 2007
123(4)
"There Are No Absolute Rules of Conduct, Either in Peace or War"---Leon Trotsky
127(3)
Georgia, 2008
130(3)
Net Warriors
133(4)
Ukraine
137(5)
The United States
142(6)
"What Is to Be Done?"
148(7)
6 Violent Extremist Organizations and Terrorism in the Cyber Domain
155(20)
Definitions
156(1)
A Spectrum of Cyber-Enabled Terrorist Operations
156(3)
Cyber-Enabled Recruitment and Radicalization
159(1)
Phases of Internet Radicalization
159(5)
Planning, Command, Control, and Communications
164(2)
Armed Attack
166(2)
Cyber Target: Industrial Control Systems
168(1)
"Psyber Operations"
169(1)
A Hypothetical Case of Strategic Cyberterrorism
170(2)
Conclusion
172(3)
7 Public-Private Partnerships
175(16)
The Information Society: An Emerging Societal Construct
176(1)
A Global Culture of Cyber Security for the Information Society
177(5)
World Summit on the Information Society and Internet Governance Forum
182(3)
The Perils of Private Ordering: Network Effects, Trust, and Community Harm
185(2)
Conclusion
187(4)
8 Cyber Horizons
191(24)
Big Data
191(4)
Artificial Intelligence
195(1)
Robotics and AI
196(3)
Machine Learning
199(3)
Third Offset Strategy
202(3)
Distributed Ledger Technology
205(6)
Conclusion
211(4)
Appendix: Strategic Military Cyber Concepts
215(44)
Cyber Law and Policy
216(22)
Gary Brown
Israel King
North Korean Cyber
238(9)
Adam Albarado
Normalizing Cyber Disruption as an Element of National Power
247(4)
Sam Kidd
Pano Yannakogeorgos
ISR and Cyberspace
251(8)
Robert Johnson
Daniel Votipka
Danielle Dye
Trevor Stutting
Jamie Blummer
Tiffany Harbour
Laura LeFevre
Thomas Shew
Abbreviations 259(2)
Index 261(6)
About the Authors 267
Jack Jarmon has taught international relations courses at the University of Pennsylvania, the John C. Whitehead School of Diplomacy and International Relations at Seton Hall University, and Rutgers University where he was also Associate Director of the Command, Control and Interoperability Center for Advanced Data Analysis a Center of Excellence of the Department of Homeland Security, Science and Technology Division.

Pano Yannakogeorgos is Dean of the Air University Cyber College. Previously, he taught at Rutgers University Division of Global Affairs, and served as an Adviser within the United Nations Security Council.